If your Internet Service does not provide you with all of this information and more for $9.99, why not sign up with us?
SIGN UP FOR INTERNET SERVICE - CLICK HERE!
This information is from sysinternals - Copyright © 2005 Bryce Cogswell and Mark Russinovich
Please click here to go to the sysinternals website for more information
The term rootkit is used to describe the mechanisms and techniques whereby malware,
including viruses, spyware, and trojans, attempt to hide their presence from spyware blockers, antivirus, and system management utilities. There are several rootkit classifications depending on whether the malware survives reboot and whether it executes in user mode or kernel mode.
Please click here to read the entire article. (Very good and worth reading even if it is an old article)
A rootkit is a collection of tools an intruder brings along to a victim computer after gaining initial access.
A rootkit generally contains network sniffers, log-cleaning scripts, and trojaned replacements of core system utilities such as ps, netstat, ifconfig, and killall.
Although the intruders still need to break into a victim system before they can install their rootkits, the ease-of-use and the amount of destruction they cause make rootkits a big threat for system administrators.
Information on this page was gathered from various websites such as;
Sysinternals
ROOTKIT - The Online Rootkit Magazine
Diamond Computer Systems
Microsoft's worm-cleansing tool has been updated to detect and remove Hacker Defender, a notorious rootkit program used by malicious virus writers.
Click here to read the entire article from eWEEK
** Please remember that programs listed or downloaded from this page are only provided from us as a courtesy.
We make no warranty on any of the information or software